scholarly journals USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK

Compiler ◽  
2013 ◽  
Vol 2 (1) ◽  
Author(s):  
Bimio Wahyu Aji ◽  
Hero Wintolo ◽  
Dwi Nugraheny

Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.

Author(s):  
Rahmat Novrianda Dasmen

Pemetaan IP (Internet Protocol) Address pada setiap user yang ada di LAN (Local Area Network) STIPER Sriwigama Palembang saat ini masih dilakukan secara manual dan terkadang tanpa mencatat IP address yang telah diberikan pada user-user sebelumnya sehingga terjadi kesamaan IP address yang menyebabkan bentrokan saat pengiriman data. Hal inilah yang menjadi penyebab dasar sehingga peneliti bermaksud mengimplementasikan metode VLSM (Variable Length Subnet Mask) sehingga dapat memetakan IP address untuk user ke dalam beberapa bagian. Pada STIPER Sriwigama Palembang dibagi beberapa bagian user yaitu : Ketua, Wakil Ketua, LPPM, Administrasi, Dosen, Staff, Perpustakaan dan Mahasiswa. Perhitungan pemetaan IP address dengan metode VLSM ini diawali dari jumlah user yang terbanyak dari beberapa bagian yang telah dibagi di atas. Pemetaan IP ini menjadi solusi dari permasalahan yang terjadi pada STIPER Sriwigama Palembang sehingga dengan metode VLSM tidak lagi terjadi bentrokan IP address karena setiap user telah memperoleh IP address dan subnet mask yang berbeda-beda.


1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 39
Author(s):  
Wan Muhd Hazwan Azamuddin ◽  
Rosilah Hassan ◽  
Azana Hafizah Mohd Aman ◽  
Mohammad Kamrul Hasan ◽  
Ahmed Salih Al-Khaleefa

This study presents the proposed testbed implementation for the Advanced Technology Training Center (ADTEC) Batu Pahat, one of Malaysia’s industrial training institutes. The objectives of this study are to discover the issues regarding network congestion, propose a suitable method to overcome such issues, and generate output data for the comparison of the results before and after the proposed implementation. The internet is directly connected to internet service providers (ISPs), which neither impose any rule nor filter the traffic components; all connections comply on the basis of the base effort services provided by the ISP. The congestion problem has been raised several times and the information technology (IT) department has been receiving complaints about poor and sometimes intermittent internet connection. Such issues provide some ideas for a possible solution because the end client is a human resource core business. In addition, budget constraints contribute to this problem. After a comprehensive review of related literature and discussion with experts, the implementation of quality of service through add-on rules, such as traffic policing on network traffic, was proposed. The proposed testbed also classified the traffic. Results show that the proposed testbed is stable. After the implementation of the generated solution, the IT department no longer receives any complaints, and thus fulfills the goal of having zero internet connection issues.


2012 ◽  
Vol 546-547 ◽  
pp. 1113-1118
Author(s):  
Jia Liu ◽  
Yu Li Shen

In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency of the network. The authentication sever (AS) and the mobile terminals are properly configured with different workloads of signature generations and signature verifications. We propose using the RSA-PSS-MR scheme and the improved ElGamal scheme. Firstly, the Recovery features of the RSA-PSS-MR scheme have reduced the communication bandwidth sharply since the public keys are not necessary to transmit in our scheme. Secondly, the asymmetry calculation of signature generations and verifications of the improved ElGamal scheme can be well used to configure the scheme. The proposed scheme resolves the real-time transmission problem of authentication.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Aditya Wisnu Pratama ◽  
Hero Wintolo ◽  
Yenni Astuti

Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.


2012 ◽  
Vol 4 (2) ◽  
pp. 18
Author(s):  
Eka Wahyudi ◽  
Adnan Purwanto ◽  
Teguh Iklas

Teknologi Internet berbasis Wi-Fi dibuat dan dikembangkan di Amerika Serikat yaitu oleh Institute of Electrical and Electronis Engineers (IEEE) yang berdasarkan kelompok standar teknis perangkat bernomor IEEE 802.11. Perangkat Wi-Fi sebenarnya tidak hanya mampu bekerja di jaringan Wireless Local Area Network (WLAN), tetapi juga di jaringan Wireless Metropolitan Area Network (WMAN). Kuantitas pengguna Internet berbasis teknologi Wi-Fi yang semakin meningkat di berbagai belahan dunia, telah mendorong internet service providers (ISP) untuk membangun hotspot yang di berbagai kota-kota besar. Hotspot merupakan suatu tempat dimana tersedianya koneksi jaringan di mana para pemakai dapat melakukan akses Internet dengan cara nirkabel (wireless) tanpa tergantung kepada jaringan fisik. Jangkauan hotspot  dapat dimaksimalkan dengan memanfaatkan antena dengan desain khusus sehingga cakupan (coverage) pancaran sinyal lebih luas. Proses pembuatan desain antena dengan media seng yang diaplikasikan untuk hotspot Wi-Fi pada outdoor diawali dengan perhitungan link budget, antara lain gain dan beamwidth dari antena. Proses pengukuran sinyal diukur dengan menggunakan bantuan software NetStumbler.


To develop and implement a Virtual Local Area Network by using sub-netting and to find the optimized IP depended on host number. When a company purchases web hosting from Internet Service Provide they will purchase several static addresses. As a result an automated system to store the information about assigned IP address and solve the problem. The main objective is to develop and discuss about the various Internet Service Provider (ISP) and securing the network by using Network Address Translator (NAT) and Access Control list (ACL). Static routes or a direct connection to the destination network i.e. a router might be running both an Open Shortest Path First version 3 (OSPFv3) process and a Routing Information Protocol (RIP) process. If the OSPF protocol is advertised to optimize the routes by RIP protocol, it is said to be redistributing RIP. The detailed information about the Dynamic protocols such as RIP, OSPFv3, EIGRP etc.., its standards, functionality and internetworking issues in the networking domain are observed and troubleshoot the problems in the internetwork connectivity using the CISCO routers and end devices and hence to design a simple network with tool with multiple routing protocols in IPv6 domain and redistribute for end-to-end communication.


Author(s):  
Solange Ghernaouti-Hélie ◽  
Arnaud Dufour

Author(s):  
Md. Anwar Hossain ◽  
Mahabuba Zannat

Computer network has become the most significant issue in our day to day life. Networking companies depend on the proper functioning and analysis of their networks for education, administration, communication, e-library, automation, etc. Mainly interfacing with the network is induced by one of the other user/users to share some data with them. So, this paper is about communication among users present at remote sites, sharing this same network UANS. UANS stands for the University Area Network Scenario. So in this work the network is designed using Cisco Packet Tracer. The paper describes how the tool can be used to develop a simulation model of the Pabna University of Science and Technology, Pabna, Bangladesh. The study provides into various concepts such as topology design, IP address configuration and how to send information in the form of packets in a single network and the use of virtual Local Area Network (VLANs) to separate the traffic generated by a different department.


Sign in / Sign up

Export Citation Format

Share Document